Which technology is most often exploited by a hacker to spread from one system to another?

Which technology is most often exploited by a hacker to spread from one system to another?

Which technology is most often exploited by a hacker to spread from one system to another?

A.
SSL certificates

B.
Buffer overflows

C.
Key-based authentication in SSH

D.
Password-based authentication in SSH

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *